πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ GoBotKR Targets Pirate Torrents to Build a DDoS Botnet ❌

The authors have tweaked a known piece of malware to specifically target Korean TV fans.

πŸ“– Read

via "Threatpost".
πŸ•΄ NIST Sets Draft Guidelines for Government AI πŸ•΄

This is the first formal step in writing the standards that will guide the implementation of AI technologies within the federal government.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Britain Looks to Levy Record GDPR Fine Against British Airways πŸ•΄

The penalty is a sign of things to come, say experts.

πŸ“– Read

via "Dark Reading: ".
❌ Rules-Based Policy Approaches Need to Go ❌

A zero-trust model is the only way to keep up with today's digital complexities.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2017-8417 (dcs-1100_firmware, dcs-1130_firmware)

An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device requires that a user logging into the device provide a username and password. However, the device allows D-Link apps on the mobile devices and desktop to communicate with the device without any authentication. As a part of that communication, the device uses custom version of base64 encoding to pass data back and forth between the apps and the device. However, the same form of communication can be initiated by any process including an attacker process on the mobile phone or the desktop and this allows a third party to retrieve the device's password without any authentication by sending just 1 UDP packet with custom base64 encoding. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-8404 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device provides a user with the capability of setting a SMB folder for the video clippings recorded by the device. It seems that the POST parameters passed in this request (to test if email credentials and hostname sent to the device work properly) result in being passed as commands to a "system" API in the function and thus result in command injection on the device. If the firmware version is dissected using binwalk tool, we obtain a cramfs-root archive which contains the filesystem set up on the device that contains all the binaries. The library "libmailutils.so" is the one that has the vulnerable function "sub_1FC4" that receives the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows an ARM little endian format. The function sub_1FC4 in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "receiver1" is extracted in function "sub_15AC" which is then passed to the vulnerable system API call. The vulnerable library function is accessed in "cgibox" binary at address 0x0008F598 which calls the "mailLoginTest" function in "libmailutils.so" binary as shown below which results in the vulnerable POST parameter being passed to the library which results in the command injection issue.

πŸ“– Read

via "National Vulnerability Database".
❌ GE Aviation Passwords, Source Code Exposed in Open Jenkins Server ❌

A DNS misconfiguration resulted in an open Jenkins server being available to all.

πŸ“– Read

via "Threatpost".
πŸ” Airline Facing Record Breaking $229 Million GDPR Fine πŸ”

The fine would be the largest against a company post-GDPR and roughly 1.5 percent of the company's annual revenue.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Android App Publishers Won't Take 'No' for an Answer on Personal Data πŸ•΄

Researchers find more than 1,000 apps in the Google Play store that gather personal data even when the user has denied permission.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researchers Poke Holes in Siemens Simatic S7 PLCs πŸ•΄

Black Hat USA session will reveal how they reverse-engineered the proprietary cryptographic protocol to attack the popular programmable logic controller.

πŸ“– Read

via "Dark Reading: ".
⚠ Apple aims privacy billboard at Google’s controversial smart-city ⚠

It's outside of Sidewalk Labs HQ in Toronto, where Google's sister company is working on stuffing the city with data-collecting sensors.

πŸ“– Read

via "Naked Security".
πŸ‘1
⚠ Firefox to include tracker blocking report feature ⚠

Mozilla has introduced a lot of tracker blocking protections into Firefox lately. Now, it is planning a new feature that will let you see how many online snoopers you’ve successfully evaded. A new feature called the Tracking Protections Panel (aka the Protection Report) will tell users how many trackers Firefox blocked in the prior week, […]

πŸ“– Read

via "Naked Security".
⚠ Google suspends Trends emails after revealing murder suspect’s name ⚠

People subscribed to Google Trends in New Zealand were emailed the murder suspect's name in violation of a New Zealand court's order.

πŸ“– Read

via "Naked Security".
❌ Rapid Incident Response Now Available through Cynet’s Free IR Service Providers Offering ❌

Cynet's 360 platform is ready out-of-the-box, for fast, easy deployment across all endpoints.

πŸ“– Read

via "Threatpost".
πŸ” How financial services companies can protect against mobile threats πŸ”

Financial services organizations face a variety of cyber threats. But mobile risks represent a major Achilles' heel for the industry, says a new report from Wandera.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Cybersecurity incidents cost businesses $45B last year πŸ”

Ransomware, cryptojacking, and business email compromise attacks all ramped up the financial losses due to cyber breaches, according to the Online Trust Alliance.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ DevOps' Inevitable Disruption of Security Strategy πŸ•΄

Black Hat USA programming will dive into the ways DevOps-driven shifts in practices and tools are introducing both new vulnerabilities and new ways of securing enterprises.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Insider Threats: An M&A Dealmaker's Nightmare πŸ•΄

Because data has never been more portable, taking it has never been easier. And that's a huge problem during mergers and acquisitions.

πŸ“– Read

via "Dark Reading: ".
⚠ Backdoor discovered in Ruby strong_password library ⚠

An eagle-eyed developer has discovered a backdoor recently sneaked into a library (or β€˜gem’) used by Ruby on Rails (RoR) web apps to check password strength.

πŸ“– Read

via "Naked Security".
πŸ” How to secure your Zoom conference line from hackers πŸ”

A Zero Day vulnerability allows any website to open up a video-enabled call on a Mac with the Zoom app installed. Here's how to patch it.

πŸ“– Read

via "Security on TechRepublic".
❌ Zoom Zero-Day Bug Opens Mac Users to Webcam Hijacking ❌

The vulnerability can be exploited on a drive-by basis by a malicious website.

πŸ“– Read

via "Threatpost".